Role-based AI permissions — from your IdP to every AI client, in one map.
PortEden's RBAC reads roles from Okta, Entra ID, and Google Workspace and turns them into default policy bundles for every AI client — Claude, ChatGPT, Copilot, Gemini, MCP servers. Engineering reads repos. Sales reads CRM. Legal reads everything but can't write. The 80% case is one map; PBAC handles the rest.
Free tier · No credit card · Works with your existing IdP
The IdP knows the roles. The AI client doesn't.
Per-user AI permissioning collapses the moment your team grows past a few people or your AI stack grows past one client. Roles are how identity teams already think — but the AI tools have no idea who's in Sales versus Legal until somebody bridges the gap.
Per-user AI policies don't scale
Every new hire and every new AI tool means re-doing the same permission wiring. Multiply 200 employees by 6 AI clients and you have 1,200 individual policies to maintain — and one-by-one to audit.
Your IdP knows the roles; the AI client doesn't
Okta thinks Jamie is in "Sales". Claude has no idea — it inherits whatever OAuth scopes Jamie clicked through. The AI ends up with the same access as the CFO because nobody mapped Sales to a permission profile.
Reviewers can't tell who has what
Without role bundles, an access review is one-by-one against every integration and every AI client. The auditor gives up; the CISO signs off on a list nobody actually checked. CC6.3 evidence is reconstructed in a spreadsheet.
One role bundle. Every integration. Every AI client.
Each row is a role from your IdP. Each column is an integration. The cell is the default scope a user in that role gets when any AI client acts on their behalf. You assign once. Every AI client inherits.
| Role | Gmail | Drive | Slack | Calendar | Jira | Notion |
|---|---|---|---|---|---|---|
| Engineering | read | full read | free/busy | full read | read | |
| Sales | full read | read | read | full read | — | read |
| Legal | full read | full read | full read | full read | read | full read |
| Finance | read | read | free/busy | — | read | |
| Executive | full read | read | read | full read | read | read |
Twelve pre-built bundles. You assign. You don't author.
Most teams need 5–8 roles. PortEden ships 12, tuned for the regulated workflows we see most often. Pin them to your IdP groups; clone and customize the two or three that need it.
Engineering
Repos, tickets, and docs — no email, no secrets
- GitHub / GitLab repos and PRs (read)
- Jira / Linear tickets and sprints (full)
- Notion / Confluence engineering spaces (read)
- Slack engineering and on-call channels (full)
- Mail and HR systems blocked at the integration boundary
- Secrets-management consoles hard-denied
- Calendar limited to free/busy
Sales
CRM + customer mail, pipeline-only calendar
- Salesforce / HubSpot accounts and opportunities (full)
- Customer email threads in Gmail / Outlook (read)
- Calendar restricted to pipeline-tagged events (full)
- Slack customer-facing channels (read)
- HR data and people-ops systems hard-denied
- Internal-only tagged threads excluded by contact rules
- Send-on-behalf requires a user click
Legal
Read everything, write nothing, privilege-tag enforced
- Mail, drive, chat across the org (full read)
- Privileged-tag enforcement on attorney-client items
- Hard-deny on send, reply, edit, delete actions
- Matter-aware time windows on active matters
- Opposing-counsel domains blocked by contact rules
- Audit-trail export for matter retention obligations
- PBAC overlay for litigation-hold matters
Finance
Financial systems, exec free/busy, PII redacted
- ERP and GL systems (read; close-period overlay)
- Executive calendars at free/busy only
- Customer financial threads (read; PII redacted)
- Drive folders tagged finance-confidential (read)
- HR, engineering, and customer-success systems blocked
- PII auto-redacted from all responses
- Quiet-period PBAC overlay before earnings
HR
People data; firewall against engineering
- HRIS (Workday, BambooHR, Rippling) — read
- Employee mail and calendar at free/busy only
- Slack #people and HR-private channels (full)
- Compensation data behind PBAC overlay
- Engineering, finance, and customer systems blocked
- PII reversibly tokenized in AI responses
- Hard-deny on send-on-behalf to non-HR addresses
Executive
Broad read; AI write requires human approval
- Mail, drive, chat, calendar across the org (read)
- Board materials and M&A folders behind PBAC overlay
- AI write actions (send, edit, share) require approval
- Privileged legal items still respect attorney-client
- Per-AI-client policy: stricter scopes for general-purpose chat
- Audit-trail export ready for board and audit committee
- Quarterly access review pre-built for the board CSV
Map. Bundle. Inherit. Review.
1. Map
Connect your IdP — Okta, Entra ID, Google Workspace — over SAML or OIDC and map IdP groups to PortEden roles. The 12 pre-built bundles cover the common patterns; clone and edit if you need a Legal-Privileged or a Finance-Auditor variant.
2. Bundle
Assign a default policy bundle to each role. Engineering reads repos, tickets, docs. Sales reads CRM and customer email. Legal reads everything but cannot write. The bundle defines visibility, contact rules, action limits, time windows, account scope, and data reduction.
3. Inherit
Policies cascade — org → role → team → user — with explicit overrides at each level. A Sales rep on the M&A working group inherits Sales scopes plus the M&A confidentiality overlay. The resolved effective policy is visible in the admin console and the audit trail.
4. Review
Export role membership, bundle definitions, and per-request enforcement logs for periodic access review. Hand the CSV to your auditor; sign-off becomes a one-page review instead of a per-user spreadsheet. Quarterly reviews drop from days to hours.
A user logs in. The bundle resolves automatically.
Here's the resolution PortEden runs the moment a user opens any AI client. IdP groups in. Resolved role and policy outcome out. Every layer is decided before the first prompt.
Same workflow, two very different operational costs.
Citations, not vague reassurances.
Role bundles map directly to the access-control clauses your auditor reads. Evidence — bundle definitions, membership exports, change logs — is exportable from the audit trail.
Your IdP roles, enforced at every integration.
Connect your IdP first; then every integration the bundle touches inherits the right scopes for every AI client. New integrations and new AI tools land inside the role bundle automatically.
Six industries, six role-bundle layouts.
One source of truth, one bundle, two engines.
PortEden's RBAC is opinionated about three things: identity belongs in your IdP, bundles beat custom rules, and roles compose with attributes. Get those three right and the rest of access management becomes a one-page review.
IdP is the source of truth
Don't manage identity twice. PortEden reads from Okta, Entra ID, or Google Workspace and stays in sync via SCIM. Deprovisioning happens upstream — remove the user from the IdP and every AI client loses access on the next prompt.
Bundles, not custom rules
Most teams need 5–8 roles; PortEden ships 12. You assign bundles to IdP groups; you don't author per-user policies. A custom bundle is one fork from a default — versioned, change-controlled, and audit-logged the same way.
RBAC + PBAC compose
RBAC handles 80% of policy with role bundles. PBAC handles the attribute-level edge cases — quiet periods, location overlays, resource-tag conditions. Same engine, same audit log, same compliance evidence path.
Pairs well with
RBAC for AI questions
What is RBAC and how does it apply to AI?
How is this different from OAuth scopes or my IdP's RBAC?
Which IdPs are supported?
Can I customize the pre-built role bundles?
Does RBAC compose with PBAC?
How are deprovisioning and offboarding handled?
Can a user be in multiple roles?
How do role changes propagate — instant or batched?
What if my org structure is matrixed (people in 2 teams)?
What evidence does this produce for SOC 2 CC6.3 auditors?
Are role-membership changes themselves audited?
What pricing tier includes RBAC?
Ready to map your IdP to every AI client in one step?
Connect your IdP, assign default bundles to your roles, and every AI tool inherits the right scopes the moment a user logs in. Free tier covers solo users; Enterprise adds SSO/SAML, SCIM, change-control workflows, and SIEM export.